Talk:Tellitec Tellinet Sat Spy manual, 6 Mar 2006

From WikiLeaks

Probably the worst aspect of this -- aside from the expectation that encrypted traffic isn't to be decrypted until necessary -- is that whoever is running the spy program does not need to be the same organization that runs the server. Apparently, the spy ability is activated server-side by a few lines in an ini file. The separate program takes care of the rest.

This also means that any customer with inquiries about their privacy will be given legitimate half-truths by a representative: "no, we don't keep logs on our servers" (true), "no, we don't keep logs" (potentially true, for a specific definition of "we"). This intercepts traffic, so to monitor anything it would need to be constantly running unless certain traffic is expected at a sure point-in-time.